Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AI-based Pilgrim Detection using Convolutional Neural Networks., , , , and . CoRR, (2019)FPGA implementation of floating-point complex matrix inversion based on GAUSS-JORDAN elimination., , , and . CCECE, page 1-4. IEEE, (2013)Dysarthric Speech Classification Using Hierarchical Multilayer Perceptrons and Posterior Rhythmic Features., , , and . SOCO, volume 87 of Advances in Intelligent and Soft Computing, page 437-444. Springer, (2011)The Design, by Physical Topology Optimizing, of a Passive UHF RFID Identification System: Suitable for Applications with Various Constraints., and . ATSIP, page 1-6. IEEE, (2020)All-Optical Fiber Interferometer-Based Methods for Ultra-Wideband Signal Generation., and . J. Electr. Comput. Eng., (2012)A new approach for optical colored image compression using the JPEG standards., , and . Signal Process., 87 (4): 569-583 (2007)Efficient visual tracking via sparse representation and back-projection histogram., and . Multimedia Tools Appl., 78 (15): 21759-21783 (2019)A Hybrid Artificial Fish Swarm Simulated Annealing Optimization Algorithm for Automatic Identification of Clusters., , , , and . Int. J. Inf. Technol. Decis. Mak., 15 (5): 949-974 (2016)ICS-IDS: application of big data analysis in AI-based intrusion detection systems to identify cyberattacks in ICS networks., , , , , , , , , and . J. Supercomput., 80 (6): 7876-7905 (April 2024)IMG-forensics: Multimedia-enabled information hiding investigation using convolutional neural network., , , , , , and . IET Image Process., 16 (11): 2854-2862 (2022)